Professional Documents
Culture Documents
Практичне заняття 4
Практичне заняття 4
Теоретичний матеріал......................................................................................................................................2
Приклад анотованого перекладу тексту:.....................................................................................................12
Приклад реферування тексту:.......................................................................................................................16
Питання для самоконтролю:.........................................................................................................................23
Практичне завдання (виконати письмово):.................................................................................................23
1. Перекладіть наступні назви журналів:.....................................................................................................23
2. Виконайте анотований переклад тексту. Виконайте реферування цього тексту................................23
3. Виконайте анотований переклад тексту. Виконайте реферування цього тексту................................27
4. Використовуючи наведені вище сталі вирази перекладіть реферат тексту українською мовою......34
5. Використовуючи наведені вище сталі вирази перекладіть реферат тексту українською мовою......35
2
Теоретичний матеріал
Існує декілька видів науково-технічного перекладу. Наприклад, вільний переклад -
розуміння і передача загального змісту тексту. Цей вид перекладу вживається в формі
перекладу-конспекту, реферату, анотації тощо. Крім знання граматики і лексики він
потребує певного обсягу знань з науки і техніки.
Дослівний переклад розкриває зміст кожного речення і допомагає вірно зрозуміти
його. При дослівному перекладі перекладене речення має ту саму структуру і порядок
слів, як і відповідне речення іноземною мовою. Але дослівний переклад не може бути
адекватним перекладом.
Адекватний переклад передає точний зміст тексту із всіма відтінками і
особливостями стилю у відповідності до норм рідної мови.
Із усіх видів технічного перекладу, письмовий переклад є основною формою
перекладу. Практично вся науково-технічна література (наприклад, іноземний патент,
інструкція, документація на обладнання та ін.) перекладається на рідну мову в формі
повного письмового перекладу.
Усі інші види технічного перекладу є похідними формами письмового перекладу.
The evolution of digital computing is often divided into generations. Each generation is
characterized by dramatic improvements over the previous generation in the technology used
to build computers, the internal organization of computer systems, and programming
languages.
1 Security Planning
One of the most important network security tasks, and probably one of the least enjoyable, is
developing a network security policy. Most computer people want a technical solution to
every problem. We want to find a program that "fixes" the network security problem. Few of
us want to write a paper on network security policies and procedures. However, a well-
thought-out security plan will help you decide what needs to be protected, how much you are
willing to invest in protecting it, and who will be responsible for carrying out the steps to
protect it.
Assess these threats in relation to the number of users who would be affected, as well as to
the sensitivity of the information that might be compromised. For some organizations, break-
ins are an embarrassment that can undermine the confidence that others have in the
19
organization. Intruders tend to target government and academic organizations that will be
embarrassed by the break-in. But for most organizations, unauthorized access is not a major
problem unless it involves one of the other threats: disclosure of information or denial of
service.
Assessing the threat of information disclosure depends on the type of information that could
be compromised. While no system with highly classified information should ever be directly
connected to the Internet, systems with other types of sensitive information might be
connected without undue hazard. In most cases, files such as personnel and medical records,
corporate plans, and credit reports can be adequately protected by standard UNIX file
security procedures. However, if the risk of liability in case of disclosure is great, the host
may choose not to be connected to the Internet.
Denial of service can be a severe problem if it impacts many users or a major mission of
your organization. Some systems can be connected to the network with little concern. The
benefit of connecting individual workstations and small servers to the Internet generally
outweighs the chance of having service interrupted for the individuals and small groups
served by these systems. Other systems may be vital to the survival of your organization.
The threat of losing the services of a mission-critical system must be evaluated seriously
before connecting such a system to the network.
In his class on computer security, Brent Chapman classifies information security threats into
three categories: threats to the secrecy, availability, and integrity of data. Secrecy is the need
to prevent the disclosure of sensitive information. Availability means that you want
information and information processing resources available when they are needed; a denial-
of-service attack disrupts availability. The need for the integrity of information is equally
obvious, but its link to computer security is more subtle. Once someone has gained
unauthorized access to a system, the integrity of the information on that system is in doubt.
Furthermore, some intruders just want to compromise the integrity of data. We are all
familiar with cases where intruders gain access to a Web server and change the data on the
server in order to embarrass the organization that runs the Web site. Thinking about the
impact network threats have on your data can make it easier to assess the threat.
Network threats are not, of course, the only threats to computer security, or the only reasons
for denial of service. Natural disasters and internal threats (threats from people who have
20
legitimate access to a system) are also serious. Network security has had a lot of publicity, so
it's a fashionable thing to worry about; but more computer time has probably been lost
because of fires than has ever been lost because of network security problems. Similarly,
more data has probably been improperly disclosed by authorized users than by unauthorized
break-ins. This book naturally emphasizes network security, but network security is only part
of a larger security plan that includes physical security and disaster recovery plans.
Many traditional (non-network) security threats are handled, in part, by physical security.
Don't forget to provide an adequate level of physical security for your network equipment
and cables. Again, the investment in physical security should be based on your realistic
assessment of the threat.
Реферат
In this article the network security is considered. The author states that hosts attached to a
network – particularly the worldwide Internet – are exposed to a wider range of security
threats than are unconnected hosts. The author emphasizes that that network security reduces
the risks of connecting to a network. He stresses that providing network security is a
balancing act between open access and security. It is noted that network security generally
means providing adequate security on individual host computers, not providing security
directly on the network. In this article the author considers security planning which includes
assessing the threat, assessing security responsibility and writing of a security policy. The
author stresses that developing a network security policy is one of the most important
security tasks. The author names and analyzes three distinct types of security threats usually
associated with network connectivity:
Unauthorized access – a break-in by an unauthorized person.
Disclosure of information – any problem that causes disclosure of valuable or sensitive
information to people who should not have access to the information.
Denial of service – any problem that makes it difficult or impossible for the system to
continue performing productive work.
The author states that one approach to network security is to distribute responsibility for, and
control over, segments of a large network to small groups within the organization. He
considers some means that can be used for providing distributed control, such as using
subnets and mailing lists.
In this article writing of a security policy is considered. The author names and describes
things that security policy must define:
The network user’s security responsibilities.
The system administrator’s security responsibilities.
The proper use of network resources.
The actions taken when a security problem is detected.
24
The author concludes that security planning which includes assessing the threat, assessing
security responsibility and writing of a security policy is the basic building block of network
security.
Tax cuts are unlikely to increase interest rates, explains Stephen Kirchner
Commentary on recent federal budgets has often focused on the implications of fiscal policy
for economic activity, inflation and interest rates. Yet there is little evidence that fiscal
29
policy settings are important to the overall level of interest rates. The contribution of budget
surpluses to national saving is subject to offsetting behaviour by the private sector. Australia
is a price-taker in global capital markets, so the international influences on Australian
interest rates are large relative to domestic influences. Cyclical influences on interest rates
are also likely to be large relative to changes in national saving. While changes in the federal
budget balance may stimulate aggregate demand, budget measures may also have important
implications for the supply-side of the economy. These supply-side implications are a more
appropriate focus for fiscal policy than the implications of the budget for aggregate demand,
inflation and interest rates.
Cyclical influences
It is worth recalling that the much maligned ‘high interest rates’ of the late 1980s were
associated with some of the largest budget surpluses as a share of GDP since the early 1970s.
The federal government ran an underlying cash surplus of 1.7% of GDP between 1988–89
and 1989–90, larger than any budget surplus delivered by Peter Costello in his 11 years as
Treasurer. The change in the federal budget balance was consistently contractionary between
1983–84 and 1989–90, including four years of budget surpluses between 1987–88 and 1990–
91. If a budget surplus is effective in lowering interest rates, it is far from apparent from this
experience. Changes in the level of interest rates are positively, not negatively correlated
with changes in the budget balance, because both are positively correlated with the business
cycle. These business cycle influences are very large relative to any plausible contribution of
increased government saving to national saving and domestic interest rates.
34
Supply-side influences
It is often argued that a positive fiscal impulse from the budget will increase aggregate
demand pressures relative to aggregate supply, if only at the margin, adding to upward
pressure on inflation and short-term interest rates. This ignores the supply-side of the
equation. The unemployment rate has recently fallen to its lowest level since the end of 1974
and this has been one of the Reserve Bank’s concerns in relation to the inflation outlook. The
multi-decade lows in the unemployment rate have also been associated with record highs in
the labour force participation rate. Increased labour force participation is important in
preventing the labour market becoming a potential source of inflationary pressure. Changes
in both government spending and taxes can be useful in inducing increased labour supply
and this may be a more significant influence on interest rates than the effect of changes in the
budget balance on demand and national saving.
This proposition seems to be more readily accepted in relation to increased government
spending on things such as childcare, but less readily accepted in relation to tax cuts. Small
changes in incentives can induce large behavioural responses, as evidenced by the
government’s cash ‘baby bonus’, which has been associated with the highest number of
births in 35 years and the second highest on record. Yet the idea that small changes in
incentives can bring about large behavioural responses seems to have very little acceptance
when discussion turns to tax cuts, perhaps because the mechanisms involved are less obvious
than in the case of more targeted government spending programs.
Treasury Secretary Ken Henry noted that Treasury modelling of the 2007 budget tax cuts
showed that they ‘might increase labour supply by about 0.1 hours per week. If this
additional supply is fully employed, the increase in labour utilisation will lift the
employment ratio by about a third of a percentage point.’ The benefits of tax cuts extend
well beyond their positive implications for labour supply, to issues relating to the deadweight
losses, compliance and collections costs that flow from the operation of the tax system, all of
which imply that tax cuts have the capacity to increase supply more broadly, not just in the
labour market. The appropriate focus for fiscal policy is precisely these microeconomic and
supply-side issues, not demand management.
35
Conclusion
Fiscal policy is unlikely to have been important in the determination of Australian interest
rates in recent years. As a small, open economy, with an open capital account, Australian
interest rates are largely determined by international and cyclical influences that can be
expected to overwhelm any contribution from changes in the federal budget balance,
government and national saving. There is little evidence, either in Australia or
internationally, for an economically or statistically significant effect from fiscal policy on
interest rates. This is most notably the case in the US, which is large enough to influence
pricing in global capital markets. The private saving offset to changes in public saving
argues against the use of fiscal policy for demand management purposes. The analysis of the
implications of fiscal policy for output, inflation and interest rates needs to go beyond simple
calculations of the fiscal impulse and its impact on demand, to a consideration of the
implications of budget measures for the supply-side of the economy, where fiscal policy can
potentially make a more important contribution to enhancing national welfare.
The author would like to thank two anonymous reviewers for comments on an earlier draft.
Комп'ютерні віруси
Then the author carries out three types of actions against an information system: a physical
attack, a syntactic attack and a semantic one. In the last part of the article the author
describes the means of computer terrorism implementation. The author names the reason of
not occurring the terrorist computer attack. It is the disproportion of the means to implement
computer terrorism that results in the fact that terrorist groups remain confined to traditional
method. After having made the broad study the author concludes that there will not be a
change to computer terrorism in the near future. From the military point of view the author is
of the opinion that the Achilles’ heel of the western civilization is information systems. One
will need years and millions of dollars to win the computer terrorism.
39
Комп'ютерний тероризм
Ця стаття присвячена проблемі комп'ютерного тероризму, яка є дуже актуальною в
наш час, оскільки наше суспільство все більше покладається на комп'ютер. Автор
розповідає історію виникнення тероризму та дає визначення цього терміну, а також
описує різні форми тероризму: тероризм внутрішній та міжнародний. Визначено
детальний перелік різних форм тероризму відповідно до Міжнародної конвенції, яка
була підписана в Женеві 16 листопада 1937 року. У цій статті розглядається
класифікація злочинності обробки даних. Проте автор підкреслює, що ця класифікація
не є вичерпною. Далі автор дає визначення терміну «злом» і розглядає деякі випадки
злому. Після цього автор починає досліджувати фрікінг (дія піратських телефонних
мереж). Автор згадує деякі випадки фрікінгу, починаючи з 1961 року.
У цій статті автор обговорює мотиви комп’ютерної злочинності. Відзначається, що
багато хакерів досліджують комп'ютерні системи через звичайну цікавість і заради
інтелектуального завдання. «Справжні» хакери мають етичний кодекс, який забороняє
знищувати будь-яку інформацію. Однак деякі люди зрозуміли, що вони можуть
використовувати ці знання для отримання переваг. Автор наводить кілька прикладів
мотивів комп’ютерної злочинності, таких як крадіжка номерів кредитних карток або
злом телефону.
Автор пропонує перелік мотивів, які можуть спонукати людей увійти у світ
комп’ютерної злочинності. Це: гроші, соціальне визнання, помста та самозахист. Далі
автор дає визначення вірусів, розігрівів і троянських програм і наводить приклади.
Після цього автор підкреслює, що найслабшою ланкою в ланцюжку комп’ютерної
безпеки є людина, і доводить це твердження кількома прикладами. Автор визначає
поняття «комп’ютерний тероризм» і пропонує два визначення:
• Комп'ютерний тероризм - це акт знищення або пошкодження комп'ютерних систем з
метою дестабілізації країни або тиску на уряд.
• Комп’ютерний тероризм – це дії, спрямовані на дестабілізацію країни або тиск на
уряд за допомогою методів, які віднесені до категорії комп’ютерних злочинів.
Потім автор здійснює три типи дій проти інформаційної системи: фізичну атаку,
синтаксичну атаку та семантичну атаку. В останній частині статті автор описує засоби
реалізації комп’ютерного тероризму. Автор називає причину того, що терористична
40
комп'ютерна атака не відбулася. Саме диспропорційність засобів реалізації
комп’ютерного тероризму призводить до того, що терористичні групи залишаються
обмеженими традиційним методом. Після проведення широкого дослідження автор
робить висновок, що в найближчому майбутньому комп’ютерний тероризм не
зміниться. З військової точки зору автор вважає, що ахіллесовою п’ятою західної
цивілізації є інформаційні системи. Щоб перемогти комп'ютерний тероризм,
знадобляться роки і мільйони доларів.
Теми рефератів
1. Особливості перекладу патентної документації.
2. Переклад інструкцій та специфікацій.
3. Специфіка перекладу заголовків у науково-технічній літературі.